Method and device for generating symmetric block ciphers

A block cipher, symmetric technology, applied to the public key and key distribution of secure communication, can solve the problems of high cost and large chip area, achieve high cost performance, realize the effect of area and speed, and reduce the area

Inactive Publication Date: 2010-06-09
苏州中科集成电路设计中心有限公司
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, if the current block cipher is implemented according to the general chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating symmetric block ciphers
  • Method and device for generating symmetric block ciphers
  • Method and device for generating symmetric block ciphers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Such as figure 1 , figure 2 The device for generating a symmetric block cipher as shown is particularly characterized in that it at least includes an initial replacement module 1, a timing control module 2, a round operation key replacement module 3, a data input controller 4, a data output controller 6, an inverse initial Replacement module 1 and a pipeline composed of several stages of pipeline modules.

[0033] Specifically, the timing control module 2 is the core of the device, and it controls the round operation key replacement module 3 to replace the round key needed for the round operation; meanwhile, its output port is also connected with the initial replacement module 1, data input control The controller 4, the data output controller 6, and the control input port of the inverse initial replacement module 7 are connected to control the flow direction of data, coordinate the function operation of each level of data in the pipeline, and make the data complete th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and device for generating symmetric block ciphers. The device adopts chips for symmetric block ciphers. The method is characterized in that initial replacement is carried out on the input data; all the round function operations in the first-stage pipeline are carried out on the input data; the data after undergoing operations in the first-stage pipeline are input into the second-stage pipeline, and the second group of data are input into the first-stage pipeline; when a group of data in one batch finish all the round function operations, the data are transmitted to an inverse initial replacement module by a data output controller under the control of a sequential control module to finish encryption and decryption operations; simultaneously, when a group of data in the above step are output, a group of data in the next batch are output to the pipeline and the rest can be done in the same manner to finish all the encryption and decryption operations. After adopting the method, under the premise of not reducing the number of rounds of cipher algorithm iteration, the area of the chips is reduced by a specific method of module reuse.

Description

technical field [0001] The invention relates to a method for generating a cipher and a device thereof, in particular to a method for generating a symmetric block cipher and a device thereof, belonging to the computing field. Background technique [0002] With the rapid development of information technology, the security requirements for data transmission and storage are getting higher and higher, so people have proposed many data encryption algorithms. At present, it has been widely used in the Internet, external satellite communication, gateway server, set-top box, video transmission and other large data transmission services and encrypted hard disk and other data storage services. [0003] There are two basic encryption algorithms: symmetric key encryption and asymmetric key encryption. Among them, symmetric key encryption is also called secret / private key encryption, that is, both parties sending and receiving data must use the same / symmetric key to encrypt and decrypt p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30
Inventor 章世华刘新宇汤晓容
Owner 苏州中科集成电路设计中心有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products